QUESTION BANK
Q1. What is network and what is a networking? Sol: - Network: - A group of two more computer system linked together is called network or network is a collection of computer to connect with each other. Networking: - Networking means two or more than two computer are connected by using transmission media and sharing the resources (like printer, scanner etc.) transfer data and message.
Q2. What are features of LAN? Sol: limited geographic operation High speed data transfer rate Full time connectivity to local services Lower in cost Cabling primary transmission medium
Q3. What are features of WAN? Sol: - WAN connect two or more local area networks Computers are connected to a wide- area network are often connected through public networks such as telephone system. They can be connected through leased lines or satellites e.g. internet.
Note: - leased line is a dedicated telephone connection between service provider and consumer.
Q4. What is the benefit of client server technology? Sol: - One or more server may be connected by the clients Multiple clients may be connected by the server at the same time Without affecting each other the client or server may be upgraded In which there is one server and other are clients Make more secure network
Q5. What is the benefit of centralized networking? Sol: - In this type of networking we can authenticate to the user from the centralized location or domain controller and we can provide services to the user from centralized location. Q6. Which cable used in star topology? Sol: - TP cable [twisted pair cable]
1. UTP cable [ unshielded twisted pair cable] 2. STP cable [ shielded twisted pair cable]
Q7. What are the difference between hub and switch? Sol: -
Does not understand MAC address - Understand MAC address Not intelligent device Broad casting Single collision domain Single Broadcast domain - Intelligent device - Unicasting - Multiple collision domain - Single brad cast domain
Q8. What is NIC? Sol: - Stand for Network interface card pronounced Nick this card makes physically connection between the computer and network.
Q9. Which connector is used for UTP? Sol: - RJ 45 (Register Jack 45)
Sol: - Media access control address a hardware address that uniquely identifies each node or computer of a network. It work on data link layer 48 bit address
Q11. What is IP address? Sol: - An identifies for a computer or devices on a TCP/IP network. Networks using the TCP/IP protocol route message based on IP address of destination. The format of IP address is a 32-bit numeric address written in four numbers separated by periods each numbers can be zero to 225.
Q12. What is the difference between base band and broad band? Sol: - Base band - One signal pass at a time in digital format.
Q13. What are different types of twisted pair cable? Sol: - STP Shielded twisted pair cable UTP Unshielded twisted pair cable
Q14. What is cross cable? Sol: - It is usually used to connect same devices. A cross cable can be used to Connect two computer directly
4
Connect Routers LAN port to a switch \hubs normal port Connect two switchs\ hubs\ by using normal port in both switches\ hubs
Q15. What is straight cable? Sol: - It is usually used to connect different types of devices. A straight cable can be used to
-
Connect a computer to switch\ hub normal port Connect a computer to a able/DSL Modems LAN Port Connect a routers WAN port to a cable\DSL Modems LAN port Connect a router LAN port to a switch\hubs uplink port
Q16. What standard is used in cross cable and straight cable? Sol: - Cable type Cross cable 1st side 568 A 568 B Straight cable 568 A 568 B 2nd side 568 B 568 A 568 A 568 B
Q17. What is topology? What are the different types of topology? Sol: - Topology: - Topology is a physical arrangement of network component. Types of network topology 1. Bus topology 2. Linear topology 3. Star topology 4. Tree topology 5. Ring topology 6. Dual ring topology 7. Mesh topology
5
8. Hybrid topology
Q18. What is different type of connections? Sol: - Dial-up Connection: - Modem, ISDN, X.25 - Virtual private network (VPN) Connection: - PPTP, L2TP to corporate network or internet Direct Connection : - serial cable, parallel cable, infrared line Local area connection: - Ethernet, token ring, cable modem, DSL,ATM,IRDA,WAN
Q19. Which tool is used for making cross and straight cable? Sol: - Crimping tool
Q20. What is OSI model? Sol: - The open system interconnection basic preference model (OSI reference model or OSI model) is an abstract description for layered communication and computer network design. In other word it is developed by ISO in 1984 and it provide the communication in between different types of hardware.
Q22. Name the devices which work on layer 2? Sol: - Switch, Bridge, LAN card
Q23. Name the devices which work on layer 3? Sol: - Router, Brouter Layer 3 switch Gateways, Access point
6
Q24. Name the devices which work on layer 1? Sol: - Cable media, LAN card, Hub
Q25. What is Ethernet? Sol: - Ethernet is the most widely installed local area network (LAN) technology specified in a standard IEEE802.3. Ethernet was originally developed by XEROX from an earlier specified called Alohanet and developed further by XEROX Dec and Intel. Ethernet used with co-axial cable, TP cable.
Q26. What is Protocol? Sol: - A protocol is the special setup rules that end point in a telecommunication connection used when they communicate.
Q27. Which protocols is used in internet? Sol: - TCP\IP Protocol (Transmission Control control\Protocol) HTTP ( Hyper Text Transfer Protocol ) FTP ( File Transfer Protocol) BGP ( Basic Gateway Protocol) DHCP (Dynamic Host configuration Protocol)
Q28. Which protocol is used by Microsoft products only? Sol: - Windows Communication protocol (MCTP) Windows Services Protocol (WSPP) Application Services and net framework protocol
Q30. What is broad casting? Sol:- Process by which a message is sent from a single host on the network without regard to the kind of data being sent or the destination of the data one into all.
Q31. What is Unicasting? Sol: - Unicasting is communication between a single sender and single receiver over a network. It mean one to one.
Q32. What is router? Sol: - Router is network device used to provide the communication in between two or more than two different network.
Q33. What is bridge? Sol: - Bridge id network device used to connect the two or more than two LAN segment as well as provide the communication.
Q34. What is routing? Sol: - Routing is the process of moving packets through an internetwork such as internet. Routing actually consists of two separate but related tasks: 1. Defining paths for the transmission of packets through an internet work.
2. Forwarding packets based upon defined path. Q35. What are the class of IP address? Sol: Class Class A Class B Class C Class D Range 1 - 127 128 - 191 192 - 223 224 - 239
8
Class E
240 254
Q36. What is public IP address? Sol: - IP address that you make known to others on the internet is called your public IP address. A unique internet protocol IP address known as a public IP address is assigned to every computer that connects to the internet. It is reverse for internet.
Q37. What is private IP address? Sol: - It is reserve got private network. The IP address that you use internally within your office, home or enterprise network, which is not made known on the internet. e.g. 10.0.0.0 10.255.255.255
Q38. What is dynamic IP address? Sol: - This is an IP address that change each time you connect to the internet. Dynamic IP address assign to the computer automatically.
Q39. What is static IP address? Sol: - Static IP address assign to the computer manually. An IP address that does not change each time the user logon to the internet.
Q40. What is subnet mask? Why it is used? Sol: - A subnet mask allows you to identify which part of an IP address is received for the network and which part is available for HOST use.
Q41. What is host IP and Network IP? Sol: - Host IP: - It represents number of host in per network. An identifier for host. A host Id uniquely identifies a host within an address family on a network but doesnt identify the network.
9
Network IP: - It represents the number of network in per class. Its IP address that identifies which network a particular system is ON.
Q42. What is the FSMO rule in window server 2003? Sol: -RID PDC Infrastructure Domain naming Schema
Q43. What is the function of DHCP server? Sol: - DHCP server is used to provide automatically IP address to the client computer.
Q44. What is lease line? Sol: - lease line is a dedicated telephone connection between service provider and consumer.
Q45. What is default gateway? Sol: - A default gateway is the node on the computer network that is chosen when the IP address does not belong to any other entries in the routing table.
Q46. What is active directory? Sol: - Active directory also allows administrator to assign polices, deploy softwares and apply critical updates to an organization.
10
Sol: - Domain controller is a server that responds to security authentication request in checking permission etc.
Q48. What is addition domain controller? Sol: - Addition domain controller provides fault tolerance balance that load of existing domain controller.
Q49. What is Domain? Sol: - Domain name is a name given to a collection of network devices that belong to a domain, which an administrative space managed according to some common characteristics of the member with the window domain server.
Q50. What is forest? Sol: - A collection of one or more domain trees with a common schema and implicit trust relationship between them. This arrangement would be used if you have multiple root DNS address.
Q51. What is tree? Sol: - In DNS the inverted hierarchical tree structure that is used to hold domain names within namespace.
Q52. What is use of DNS in internet? Sol: - It resolves the name into IP address.
Q53. What protocol used in publishing website? Sol: - HTTP [hyper text transfer protocol]
Q54. What are ports? What is the port number of FTP, HTTP, DHCP, DNS, DNS and IP?
11
Sol: - A port number is a way to identify a specific process to which an internet or other network message is to be forwarding when it arrives at a server.
21 80 67, 68 53 0
Q55. What is APIPA (automatic private IP address)? Sol: - Automatic private IP address is a feature of window based operating system that enable itself an IP address when there is no DHCP services available to perform that function.
Q56. What is RAS server? Sol: - A server that is dedicated to handling users that are not on a LAN but need remote access to it. The remote access server allows users to gain access to files and print server on the lab from a remote location.
Q57. What are different versions of window 2003? Sol: Window 2003 standard edition Window 2003 enterprise edition Window 2003 web edition Window 2003 data centre server
Q58. What are the HCL of XP/2003 windows? Sol: HCL HDD free space RAM
12
XP 1.2 GB 128MB
2003 2 GB 256MB
Processor Display
Pentium 4 VGA
Pentium 4 VGA
Q59. What is RAID? Sol: - RAID stand for redundant array of independent disk and basically involves combining two or more drives together to improve the performance and fault tolerance.
Q60. What is dynamic disk? What is difference between dynamic disk and basic disk? Sol: - Dynamic disk is a physical disk that provide features that basic disk dont such as support for volumes, spanning multi disks
Dynamic disk -
Basic disk - In which we create partition - Basic disk convert into into basic in dynamic disk - Support FAT 16\ 32, NTFS
In which we create volumes Dynamic disk doesnt convert in to basic disk. Support NTFS file system
Q61.What is local users and what are domain users? Sol: - Local users - A user account on a specific computer. A local user account is available only on the computer where the local account id defined.
Domain user A domain user account enables the services to take full advantage of the services security features of Microsoft windows and Microsoft active directory domain.
13
Q62. What is file system? Sol: - File system is the way in which files are named and where they are placed logically for storage and retrieved.
Q63. What is different between NTFS and FAT file system? Sol: -
NTFS Size Cluster size Security Encryption Compression 512MB to 16EB 4KB Yes Yes Yes
Q64. What is sharing? Sol: - Sharing is a method or way to share the folder drive and other network resources.
Q67. What id disk quota? Sol: - Disk quota is a limit set by a system administrator that restrict certain aspect of file system usage on mode in operating system.
14
Q68. What is disk compression? Sol: - Identical data is repeated many times compression technique use to enable more data to be squeezed into a finite space.
Q69. What is user profile? Sol: - A user profile is a record of user specific data that define the user working environment. The record can display setting, application setting and application connections.
Q70. What is roaming profile? Sol: - A roaming user profile is a concept in the Microsoft windows NT family of operating system that allow the user with a computer joined to a windows server domain to logon to any computer on the same network and access their local files and setting.
Q71. What is mandatory profile? Sol: - A mandatory user profile is a pre-configured user profile the user can still modify the desktop but the change are not saved when the user logoff.
Q72. What is backup? Sol: - A safe of a file, a set of file or whole desktop safe keeping in case the original is lost or damaged. Backup utility is used to protect your data if your hard disk is fail or files are accidently.
Q73. What are different types of backup? Sol: 1. Normal backup 2. Copy backup 3. Differential backup
15
Q74. What is the difference incremental and differential backup? Sol: - Differential backup clear the archive bits only after a full backup.
Incremental backup clear the archive bits each time data is backup.
Q75. Which protocol is used for remote desktop? Sol: - RDP [Remote Desktop Protocol]
Q76. What is system monitor? Sol: - A system monitor is hardware or software based system used to monitor resource and performance in a computer system.
Q77. What is print server? Sol: - Print server allows a standard printer to be shared across a network.
Q78. What is print spooler? Sol: - Print spooler program may allow a user to delete a print job being processed or other with manage the print job currently waiting to be printed.
Q79. What is NetBIOS name? Sol: - NetBIOS name is a identifier used by NetBIOS services running on computer. It is combination of 15 characters (bytes) name and a 6th character denoting the service for identifying resources on the NetBIOS network.
16
Q80. For what purpose forward DNS zones are used? Sol: - Forward DNS lookup zones are using on internet to domain name to find IP address.
Q81. For what purpose reverses DNS zones are used? Sol: - Reverse DNS lookup zones are using on internet to IP address to find a domain name.
Q82. What is DHCP relay agent? Sol: - The DHCP relay agent component is a boot strap protocol (boot TP) relay agent that relays dynamic host configuration protocol messages between DHCP.
Q83. What is scope in DHCP? Sol: - A range of IP address that the DHCP server can assigned to client data that are on subnet.
Q84. What protocol used in RAS connectivity? Sol: - Remote Access Protocol
-
PPP (Point to Point Protocol) SLIP (Serial Line Internet Protocol) PPTP (Point to Point Tunnelling Protocol )
Q86. What protocols are used in IIS server? Sol: - FTP [File Transfer Protocol] SMTP [Simple Mail Transfer Protocol]
Q87. What is NAT [Network Address Translator]? Sol: Provide a type of firewall by hiding internet IP address Enable a company to use more internet IP address Allows a company to combine multiple ISDN connecting into single internet connection
Q88. What is ICS [Internet Connection sharing]? Sol: - ICS stand for Internet Connection Sharing of software package content within the windows O/S. ICS allows you to share network resources on a home computer network quickly and cheaply.
Q89. What is group policy? Sol: - Group policy is a feature of Microsoft window NT family of O/S that provides centralized management and configuration of computers.
Q90. What is software deployment? Sol: - The process of managing and automating the package, testing distribution and installation of software file and applications to system across an enterprise network.
18
Sol: - The TRACERT command is used to visually see a network packet being sent and received and the amount of hops required for that packet to get to its destination.
Q92. Why PING command is used for? Sol: - The program is intended for use in networking measurement and management. This program contains facilities send various kinds of program packets including ICMP Echo message process the replay and record elapsed time.
Q93. Which command is used to check IP address of the computer? Sol: - IPConfig
Q94. What is native and what is mixed mode? Sol: - There are four domain levels that window server 2003 can operate 1. Window server 2003 2. Window server 2003 interim 3. Window 2000 Native 4. Window 2000 Mixed
1. Windows Server 2003: - all Win2003, no other domain controller however even
in this level the whole range of clients and member server can join domain.
2. Window server 2003 interim: - NT 4.0 server and window server 2003 (no
window 2000). This level arises when you upgrade an NT 4.0 PDC to server 2003. Interim mode is important where you have NT4.0 groups with more than 5000 member. WIN 2000 doesnt allow you to create more than group with more than 5000 user.
3. Window 2000 native: - (Yes WIN2000 native) allow 2000 and WIN 2003 (No
NT4.0).
4. WIN 2000 mixed : - (Yes WIN2000 mixed) allow NT BDC and WIN 2000,
naturally Win200 mixed is the default function level because it support all types of domain controller.
19
Q95. What is trust relationship? Sol: - Trust are authentication pipelines that must be present in order for user in domain to access resources in another domain.
Q96. What is transitive trust relationship? Sol: - A transitive trust an automatic trust association between parent and child domain and between root domains in an active directory.
Q97. What is two way of non-transitive relationship? Sol: - A non-transitive trust in bounded by the two domains in trust relationship and doesnt flow to any other domain in the forest.
Q98. What is different between routable and non-routable protocol? Sol: - Routable protocol: - A communication protocol that contains a network address as well as a devices address. It allow packet to be forward from one network to another network. Examples of routable protocol are TCP\IP, IPX, and AppleTalk.
Non-routable protocol: - It contains only a device address and not a network address. It doesnt interoperate an addressing scheme for ending data from one network to another. Examples are NetBIOS and DECS LAT
Q99. How many types of trust are? Sol: 1. One way trust 2. Two way trust 3. Transitive trust 4. Non Transitive trust
Sol:- FTP - File Transfer Protocol HTTP Hyper Text Transfer Protocol DNS Domain Name Server DHCP Dynamic Host Configuration Protocol RAS Remote Access Server RARS Routing and Remote Access ARP Address Resolution Protocol IGMP Internet Group Message Protocol ICMP Internet Control Message Protocol PPP Point to Point Protocol L2TP Layer Two Tunnelling Protocol CHAP Challenge Handshake Authentication Protocol MSCHAP Microsoft Challenge Handshake Authentication Protocol EAP Extensible Authentication Protocol PAP Password Authentication Protocol SPAP Shiva Password Authentication Protocol RIP Routing Information Protocol PING Packet Internet Grouper PXE - Pre - Executional Environment OSPF Open Start Path First NNTP Network News Transfer Protocol SMTP Simple Mail Transfer Protocol IMAP Internet Message Access protocol POP Post Office Protocol MAC Media Access Controller VPN Virtual Private Network TCP Transmission Control Protocol
21
IP Internet Protocol LAN Local Area network WAN Wide Area Network CAN Campus Area Network IIS Internet Information Services DFS Distributed File System PAN Personal Area Network MAN Metropolitan Area Network PDC Primary Domain Controller ADC Additional Domain Controller RIS Remote Installation Service RDP Remote Desktop Protocol EIA/TIA Electronic Industry Association / Telecommunication Industry Association UTP Unshielded Twisted Pair STP Shielded Twisted Pair EFS Encrypted File System RJ-45 - Register Jack ST/SC Straight Tips / subscriber connector Wi-Fi - Wireless Fidelity MbPS Mega bit Per Second KbPS Kilo bit Per Second BPS Byte per Second IPX/SPX- Internet Packet Exchange / Sequence Packet Exchange NETBEUI Net bios extended user interface IANA Internet Assign Number Authority IEEE Institute of Electrical and Electronic Engineers
22
DOD - department of defence IETP Internet Engineering Task Force OSI Open System Interconnection DSL Digital Subscriber Line ISDN Integrated Services Digital Network FDDI Fiber Distributed Data Interface ATM Asynchronous Transfer Modem
Q101. Port number of following: Sol: -This file contains port numbers for well-known services defined by IANA
Service name Echo Echo Discard Discard systat systat daytime daytime qotd qotd chargen chargen ftp-data ftp ssh telnet smtp time time rlp nameserver nameserver
port number/protocol 7/tcp 7/udp 9/tcp sink null 9/udp sink null 11/tcp users 11/udp users 13/tcp 13/udp 17/tcp quote 17/udp quote 19/tcp ttytst source 19/udp ttytst source 20/tcp 21/tcp 22/tcp 23/tcp 25/tcp mail 37/tcp timserver 37/udp timserver 39/udp resource 42/tcp name 42/udp name
23
comment
Active users Active users Quote of the day Quote of the day Character generator Character generator FTP, data FTP. control SSH Remote Login Protocol Simple Mail Transfer Protocol Resource Location Protocol Host Name Server Host Name Server
nicname domain domain bootps bootpc tftp gopher finger http hosts2-ns hosts2-ns kerberos kerberos hostname iso-tsap rtelnet pop2 pop3 sunrpc sunrpc auth uucp-path sqlserv nntp ntp epmap epmap netbios-ns netbios-ns netbios-dgm netbios-ssn imap sql-net sqlsrv pcmail-srv snmp snmptrap print-srv bgp
irc ipx rtsps rtsps mftp mftp ldap https https microsoft-ds microsoft-ds kpasswd kpasswd
43/tcp whois 53/tcp 53/udp 67/udp dhcps 68/udp dhcpc 69/udp 70/tcp 79/tcp 80/tcp www www-http 81/tcp 81/udp 88/tcp krb5 kerberos-sec 88/udp krb5 kerberos-sec 101/tcp hostnames 102/tcp 107/tcp 109/tcp postoffice 110/tcp 111/tcp rpcbind portmap 111/udp rpcbind portmap 113/tcp ident tap 117/tcp 118/tcp 119/tcp usenet 123/udp 135/tcp loc-srv 135/udp loc-srv 137/tcp nbname 137/udp nbname 138/udp nbdatagram 139/tcp nbsession 143/tcp imap4 150/tcp 156/tcp 158/tcp 161/udp 162/udp snmp-trap 170/tcp 179/tcp
194/tcp 213/udp 322/tcp 322/udp 349/tcp 349/udp 389/tcp 443/tcp 443/udp 445/tcp 445/udp 464/tcp 464/udp
Domain Name Server Domain Name Server Bootstrap Protocol Server Bootstrap Protocol Client Trivial File Transfer World Wide Web HOSTS2 Name Server HOSTS2 Name Server Kerberos Kerberos NIC Host Name Server ISO-TSAP Class 0 Remote Telnet Service Post Office Protocol - Version 2 Post Office Protocol - Version 3 SUN Remote Procedure Call SUN Remote Procedure Call Identification Protocol SQL Services Network News Transfer Protocol Network Time Protocol DCE endpoint resolution DCE endpoint resolution NETBIOS Name Service NETBIOS Name Service NETBIOS Datagram Service NETBIOS Session Service Internet Message Access Protocol PCMail Server SNMP SNMP trap Network PostScript Border Gateway Protocol
Internet Relay Chat Protocol IPX over IP
MCom MCom
Lightweight Directory Access Protocol HTTP over TLS/SSL HTTP over TLS/SSL Kerberos (v5) Kerberos (v5)
24
comsat
new-who
sldap
25
26